Format string vulnerability in the vinagre_utils_show_error function (src/vinagre-utils.c) in Vinagre 0.5.x before 0.5.2 and 2.x before 2.24.2 might allow remote attackers to execute arbitrary code via format string specifiers in a crafted URI or VNC server response.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Vinagre | Gnome | 0.5.0 (including) | 0.5.0 (including) |
Vinagre | Gnome | 0.5.1 (including) | 0.5.1 (including) |
Vinagre | Gnome | 2.23.1 (including) | 2.23.1 (including) |
Vinagre | Gnome | 2.23.2 (including) | 2.23.2 (including) |
Vinagre | Gnome | 2.23.3 (including) | 2.23.3 (including) |
Vinagre | Gnome | 2.23.3.1 (including) | 2.23.3.1 (including) |
Vinagre | Gnome | 2.23.4 (including) | 2.23.4 (including) |
Vinagre | Gnome | 2.23.90 (including) | 2.23.90 (including) |
Vinagre | Gnome | 2.23.91 (including) | 2.23.91 (including) |
Vinagre | Gnome | 2.23.92 (including) | 2.23.92 (including) |
Vinagre | Gnome | 2.24.0 (including) | 2.24.0 (including) |
Vinagre | Gnome | 2.24.1 (including) | 2.24.1 (including) |
Vinagre | Ubuntu | hardy | * |
Vinagre | Ubuntu | intrepid | * |
Vinagre | Ubuntu | upstream | * |